Yara Rules Explained | Complete Tutorial | TryHackMe Yara
We covered an introduction to YARA rules and how to create them to detect malwares using patterns that match…
We covered an introduction to YARA rules and how to create them to detect malwares using patterns that match…
Nebula Level 06 Description The flag06 account credentials came from a legacy unix system.a To do this level, log…
Nebula Level 04 Description This level requires you to read the token file, but the code restricts the files…
We covered The Pyramid of pain concept used in incident response and threat hunting which covers the artifacts of…
We covered TryHackMe Dreaming challenge where we demonstrated penetration testing concepts such as exploiting a vulnerable version of Pluck…
Nebula Level 05 Description Check the flag05 home directory. You are looking for weak directory permissions To do this…
Nebula Level 08 Description World readable files strike again. Check what that user was up to, and use it…
We covered an incident response scenario that involved using forensics skills to investigate a webserver hacked by exploiting a…
We covered scanning hosts for services, open ports, running software, hidden directories using scanning tools such as Nmap and…
In this video walkthrough, we covered TryHackMe Upload Vulnerabilities room where we demonstrated methods and techniques to exploit file…